🔧На сайте запланированы технические работы
25.12.2025 в промежутке с 18:00 до 21:00 по Московскому времени (GMT+3) на сайте будут проводиться плановые технические работы. Возможны перебои с доступом к сайту. Приносим извинения за временные неудобства. Благодарим за понимание!
🔧Site maintenance is scheduled.
Scheduled maintenance will be performed on the site from 6:00 PM to 9:00 PM Moscow time (GMT+3) on December 25, 2025. Site access may be interrupted. We apologize for the inconvenience. Thank you for your understanding!

 

On some artificial intelligence methods and technologies for cloud-computing protection


Cite item

Full Text

Open Access Open Access
Restricted Access Access granted
Restricted Access Subscription Access

Abstract

An overview of data-mining technologies used in applied information security systems is presented. The focus is made on a new and actively developing trend, cloud-computing media (including the socalled fog computing). The status and promising opportunities of using artificial intelligence models and methods to solve information security problems are also discussed.

About the authors

A. A. Grusho

Federal Research Center Informatics and Control

Author for correspondence.
Email: grusho@yandex.ru
Russian Federation, Moscow, 119333

M. I. Zabezhailo

Federal Research Center Informatics and Control

Email: grusho@yandex.ru
Russian Federation, Moscow, 119333

A. A. Zatsarinnyi

Federal Research Center Informatics and Control

Email: grusho@yandex.ru
Russian Federation, Moscow, 119333

V. O. Piskovskii

Applied Research Center for Computer Networks

Email: grusho@yandex.ru
Russian Federation, Moscow, 142784

Supplementary files

Supplementary Files
Action
1. JATS XML

Copyright (c) 2017 Allerton Press, Inc.